Security Efficacy: Is Your Program as Good as You Think It Is
Your information security program is the glue that holds together virtually all aspects of IT. It also defines your long-term outcomes in terms of business resilience. Watch this webinar to learn how.
How to Think Like a Cybercriminal (So You Can Outwit Them)
How well do you really know your environment, your security practices and policies? Do you know your cyberattackers’ tools, techniques and the procedures that they use to exploit your vulnerabilities?
Building an Incident Readiness and Response Playbook
Don't make a data breach any harder than it needs to be. We’ll walk you through the Xs and Os of any good security incident readiness and response playbook. View webcast now.
How to Leverage DNS to Get Your Security Program Under Control
A well-run information security program requires not only great visibility but also the necessary control. Security around DNS is often the weak link. Whether it’s an automated computer transaction or
Webinar: Is Your Cybersecurity on the Naughty List (Again)?
In this webcast, view now to learn from cybersecurity expert Duncan McAlynn on how to protect and defend your organization against menacing attacks in 2020.
Gearing Up for 2020: Best Practices to Secure Your Remote Workers
Today’s workplaces are changing. More organizations are switching to direct internet access (DIA) at satellite offices. Watch webcast to discover a better way to see and control all internet traffic.
Ransomware Trends to Prevent in 2020
Ransomware is a threat for businesses large and small. Learn practical tips on how to prevent trending threats in 2020.
See Protect Users Endpoints Everywhere
Users have adopted the cloud, changing the way we work. Has your security kept up? View this webcast to learn how to your users safe with deep visibility into endpoints, apps, files and locations.
Meet Your New Best Friend: DNS Security
Brush up on DNS security fundamentals, learn how DNS-layer security can help you block threats before they reach your users, and gain visibility into what’s really happening on your network.
Cybersecurity Tips for Device & Data Protection: Summertime Edition
Media Webcast: Don't get burned this summer by crafty phishing attempts, rogue WiFi hotspots, lost or stolen devices, and varying encryption laws. Watch now.
Today’s Balancing Act: Security & Flexibility
Watch speaker, Joseph Paradi, Sr. Director ITS Infrastructure at Avanade, discuss how a sound cloud security strategy can help defend against security threats, simplify security and support users.
6 ways to amplify your security stack
The average company uses more than 50 security vendors. Firewalls. Web proxies. SIEM. Appliances. Third-party intelligence. The list goes on, and yet you still finding your stack coming up short.
Getting to know DNS security, again
Users are working off-hours, off-network, and off-VPN. Are you up on all the ways DNS can be used to secure them? If not, maybe it’s time to brush up. Learn how DNS-layer security can help you.
Hello direct internet access; hello risk
Learn how to gain better performance and more security effectiveness for your branch offices from Cisco’s Product Marketing Manager Kevin Rollinson.